首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
李现涛  郭达伟  李杨 《微处理机》2011,32(5):38-40,49
近年来,移动无线自组织网络迅速发展,在该平台上实时语音通信的需求也日益显现。在linux平台下,利用VOIP和RTP等技术实现了无线移动自组织网络的多跳即时语音通信系统。并通过上网本组成的硬件实验平台进行了移动实验,在低速移动条件下的实时语音通信效果MOS评分在3.5以上,能够满足即时语音通信的需求。  相似文献   

2.
移动自组织网络是由无线移动节点组成的复杂分布式通信系统.研究了移动自组织网络的入侵检测问题,对当前Ad hoc网络上的入侵行为和入侵检测技术进行了分析,论述了学习Petri网络应用于入侵检测系统中的优势,给出了一个基于学习Petri网络的入侵检测实施模型,并在网络仿真软件ns2中对其进行了评估.  相似文献   

3.
本文介绍了一种车辆通信系统嵌入式终端通过CPRS无线网络接入方式.车辆移动自组织网络与Internet互联的网络结构,车辆移动自组织网络与Internet网络相互通信的基本原理,以及以PPP协议为基础接入Internet互联网的方法,并针对车辆通信嵌入式系统平台的特点给出了车辆通信系统通过GPRS模块无线接入Internet的一些系统关键技术和方法.  相似文献   

4.
话说移动因特网   总被引:2,自引:0,他引:2  
移动因特网是一种新的网络技术,它支持自组织移动组网结构。从本质上说,移动因特网是一种移动路由网络,这种网络用在未来的商用和军用通信上具有诸多优点。目前,国特网工程特别工作组(IETF)正在对移动因特网制定标准。本文就移动因特网的有关技术和应用问题作一简要讨论。  相似文献   

5.
无线移动自组织网络的发展为新一代军事通信系统的发展注入了新的生命力.媒质接入技术是无线移动自组织网络的关键技术之一.本文介绍了美军近年来研发的基于移动自组织网技术的军用无线通信系统并对媒质接入问题进行了分析与总结.  相似文献   

6.
无线移动自组织网络的发展为新一代军事通信系统的发展注入了新的生命力。媒质接入技术是无线移动自组织网络的关键技术之一。本文介绍了美军近年来研发的基于移动自组织网技术的军用无线通信系统并对媒质接入问题进行了分析与总结。  相似文献   

7.
基于机器学习的移动自组织网络入侵检测方法   总被引:1,自引:0,他引:1  
杨德明  潘进  赵爽 《计算机应用》2005,25(11):2557-2558
移动自组织网络是由无线移动节点组成的复杂分布式通信系统。研究了移动自组织网络的入侵检测问题,采用了一种新型的基于机器学习算法的异常入侵检测方法。该方法获取正常事件的内部特征的相互关系模式,并将该模式作为轮廓检测异常事件。在Ad hoc 按需距离向量协议上实现了该方法,并在网络仿真软件QualNet中对其进行了评估。  相似文献   

8.
随着移动自组织网络在各个领域内得到广泛的使用,其安全性研究显得越来越重要。DDoS攻击给有线网络造成了很大的威胁,同样也威胁到了移动自组织网络的安全性。由于移动自组织网络和有线网络存在着结构型差异,因此移动自组织网络中的DDoS攻击研究与有线网络中的DDoS攻击研究有较大的不同。论文首先描述了移动自组织网络的安全状况;然后从移动自组织网络的网络架构出发,分别分析移动自组织网络中针对物理层、MAC层、网络层以及传输层的DDoS攻击,同时总结针对不同网络层次的攻击所需要采取的防御措施;最后为移动自组织网络建设过程中就如何防范DDoS攻击提出参考意见。  相似文献   

9.
由于P2P网络与移动自组织网络存在许多相似特性,提出基于P2P的大规模移动自组织网络多路径路由模型,以提高移动自组织网络可扩展性和路由效率。新模型通过掩码轮换匹配机制发现多路径路由,并按照最优传输权重机制进行流量分配,达到动态感知移动自组织网络物理拓扑变化和平衡网络负载的目的。仿真实验证明,新模型能够适用于大规模移动自组织网络环境,并且有效提高了大规模移动自组织网络路由性能。  相似文献   

10.
移动自组织网络的应用迫切要求组播支持。应用层组播是解决组播问题的一种有效的方案。针对目前移动自组网络中网络层组播出现的问题,深入研究了移动自组织网络应用层组播,并作了详尽的性能比较。深入分析了移动自组织网络覆盖组播的优势,并指出了移动自组织网络组播亟待解决的问题,为新的移动自组织网络应用层组播研究提供了非常有价值的研究方向。  相似文献   

11.
One's model of skill determines what one expects from neural network modelling and how one proposes to go about enhancing expertise. We view skill acquisition as a progression from acting on the basis of a rough theory of a domain in terms of facts and rules to being able to respond appropriately to the current situation on the basis of neuron connections changed by the results of responses to the relevant aspects of many past situations. Viewing skill acquisition in this ways suggests how one can avoid the problem currently facing AI of how to train a network to make human-like generalizations. In training a network one must progress, as the human learner does, from rules and facts to wholistic responses. As to future work, from our perspective one should not try to enhance expertise as in traditional AI by attempting to construct improved theories of a domain, but rather by improving the learner's access to the relevant aspects of a domain so as to facilitate learning from experience.  相似文献   

12.
防火墙作为网络安全设备越来越多地应用于局域网络与公用网络的互联中,具有服务代理、包过滤、入侵检测等功能。防火墙作为一个网络互连设备,在组建网络中还有着局域网与Internet互联、隐藏防火墙外网IP地址、隐藏内部网络、IP地址重定向、安全访问控制以及构建VPN等应用。文中结合某单位的局域网规划设计就防火墙的应用作了重要的阐述。  相似文献   

13.
简单介绍利用摄像头进行图像采集后,通过对图像信号进行处理.实现非接触式板坯长度测量,并依据测量结果,驱动切割设备自动定住,实现连铸钢坯的高精度自动定尺切割。  相似文献   

14.
目前我们铁路运输事业快速发展,全国各地都新建了高铁铁路。速度是提升了,安全问题也不能忽视。列车在运行过程中要想保证安全,就需要铁道各处的信号信息正确。控制台通过相关的信号设备将运行的指令传递给列车,以保证铁路的整体运行情况。在新的时期,需要能够全天候检测铁路安全的方法,以便维修人员能够及时了解问题并处理。本文通过对TJWX-2006型信号设备监测系统进行研究,来分析在铁路上使用微机来检测铁路的运行情况。这对研究信号设备安全有着积极的意义。  相似文献   

15.
《Ergonomics》2012,55(4):441-475
The operation of machines typically requires attention to instruments that signal the state of the machine. One safeguard against primary instrument malfunction is to provide backup instruments, but this works only if the operators react to malfunction by switching attention to the backups. Little is known about the effect of negative outcomes or feedback on allocation of attention to backup instruments. Four experiments demonstrated that prior practice causes operators of a simulated machine to adapt to instrument malfunction by changing to a suboptimal decision rule rather than by reallocating attention to a different set of instruments. This fallacy appears linked to the operators' failures to notice feedback that they should switch during the simulations and operators' failures to correctly interpret outcome feedback following the simulations. The results raise theoretical questions and warn interface designers not to overrate backup instruments.  相似文献   

16.
养护是混凝土制品生产的一个重要环节,根据养护过程中温度变化过程的专家经验和模糊控制理论为设计依据,应用西门子S7—300PLC控制设备,实现养护过程温度变化过程的合理控制。对目前高效的蒸汽养护混凝土方式的温度量控制进行了探索与应用,在实践中证实了这种养护方式的良好性能。  相似文献   

17.
One of the main consequences of the extended enterprise is the emergence of new forms of relationships between the customer and the supplier in order to ensure the quality of service of the object throughout the life cycle. Innovative communication and co-operation methods are needed to support these new relationships. The combination of modern information processing and communication tools, commonly referred to as tele-service, offers the technical support required to access remote information. Indeed, it is easier to transfer information and knowledge to different actors than to move an actor to the site. However, even if this technical support is necessary for information communication, it is insufficient to develop a co-operation-based working situation that involves many self-motivated customers and suppliers sharing a common goal. This synergy is an emergent property of the system as a whole, and it is not expected to be obtained as a simple sum of its components. For example, a challenging problem in the field of product manufacturing is to assist the operator in its decision-making, when the system functioning is degraded, to preserve the system under service at maximum (anticipation of the failure) while remaining it in a space of allowed operation (to avoid consequences of an error in judgement). That means an evolution from tele-service to e-work and e-maintenance in particular where the assistance to operator results from collaboration of maintenance processes and experts. Consequently, this paper examines some issues and challenges involved in the evolution from the tele-maintenance of an industrial platform to the e-maintenance, and then proposes a multi-agent system-based collaboration as a solution to implement the e-maintenance experiments.  相似文献   

18.
This study set out to investigate the type of media individuals are more likely to tell self-serving and other-oriented lies, and whether this varied according to the target of the lie. One hundred and fifty participants rated on a likert-point scale how likely they would tell a lie. Participants were more likely to tell self-serving lies to people not well-known to them. They were more likely to tell self-serving lies in email, followed by phone, and finally face-to-face. Participants were more likely to tell other-oriented lies to individuals they felt close to and this did not vary according to the type media. Participants were more likely to tell harsh truths to people not well-known to them via email.  相似文献   

19.
IPv6协议下域名系统的扩展与实现   总被引:1,自引:0,他引:1  
为了实现对IPv6协议的支持,需要对现有IPv4协议下的域名系统进行相应的扩展,以使其能在IPv6协议下正确地进行IP地址与域名的正向或反向解析。域名系统的扩展主要包括以下两方面:一是增加了两个新的资源记录AAAA和A6来存储IPv6地址,以实现域名到IPv6地址的正向解析;二是增加了两个新域:ip6.int和ip6.arpa,以实现IPv6地址到域名的反向解析。文中以著名的域名系统软件BIND为对象,以Linux操作系统Redhat9作为实验平台,详细介绍了基于Linux平台的域名系统对IPv6协议的扩展与实现,从而为实现IPv4到IPv6的平稳过渡打下了坚实基础。  相似文献   

20.
Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function (e.g., notify, warn, and advice) to a user about the consequence effect of an action. However, most of the computer users tend to ignore those security warnings conveying the same message over and over again. This eventually leads to habituation. Considering the fact that there is a significant lack of focus paid to address this issue, the main objective of this article is to describe and summarize the related studies on users’ habituation to the security warnings. This article presents a systematic literature review to explore the current key issues, challenges, and the possible solutions related to habituation effects in security warnings. It is expected that this article could contribute to a more complete understanding of the habituation effects in security warnings and eventually bring benefits to the research communities or general publics.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号